Sciweavers

374 search results - page 72 / 75
» On Communicating Automata with Bounded Channels
Sort
View
105
Voted
WCNC
2008
IEEE
15 years 6 months ago
Interference in a Cognitive Network with Beacon
—We study a cognitive network consisting of multiple cognitive users communicating in the presence of a single primary user. The primary user is located at the center of the netw...
Mai Vu, Saeed S. Ghassemzadeh, Vahid Tarokh
CONCUR
2004
Springer
15 years 5 months ago
Type Based Discretionary Access Control
Abstract. Discretionary Access Control (DAC) systems provide powerful mechanisms for resource management based on the selective distribution of capabilities to selected classes of ...
Michele Bugliesi, Dario Colazzo, Silvia Crafa
CP
2003
Springer
15 years 4 months ago
Generating High Quality Schedules for a Spacecraft Memory Downlink Problem
This work introduces a combinatorial optimization problem called Mars Express Memory Dumping Problem (Mex-Mdp), which arises in the European Space Agency program Mars Express. It c...
Angelo Oddi, Nicola Policella, Amedeo Cesta, Gabri...
82
Voted
TIT
1998
69views more  TIT 1998»
14 years 11 months ago
Relationships Between the Constant Modulus and Wiener Receivers
— The Godard or the constant modulus algorithm (CMA) is an effective technique for blind receiver design in communications. However, due to the complexity of the Constant Modulus...
Hanks H. Zeng, Lang Tong, C. Richard Johnson Jr.
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 8 days ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs